I have configured fail2ban to run on my central log server rather than on individual servers.  fail2ban updates an ACL in my network firewall[1] to impose a blanket ban instead of a per-server or per-service ban.  Updating the firewall ACL is moderately expensive, so I'd rather not do it more than absolutely necessary.  The firewall ACLs are persistent across reboots of the firewall; the firewall is competely unaffected by the central log server rebooting (or fail2ban restarting).  Given my setup, fail2ban need not, and because of the expense should not, re-ban everything on fail2ban restarting.  Is there some way to prevent fail2ban from re-banning IPs on startup?

Thanks,
MJB

[1] I modified the scripts at https://www.crypt.gen.nz/2017/09/20/ciscoios-acl-a-fail2ban-module-for-managing-cisco-ios-acls/ to handle my firewall.

------------------------------------------------------------------------------
Check out the vibrant tech community on one of the world's most
engaging tech sites, Slashdot.org! http://sdm.link/slashdot
_______________________________________________
Fail2ban-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/fail2ban-users

Reply via email to